Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Don’t Want to Get Caught in the Middle of a Hacking War [VIDEO]

b2ap3_thumbnail_hacker_wars_400.jpgWhen you see the results of a major hacking campaign on the news, you might tend to sympathize with the victim. While most hacks target individuals or high-profile businesses, hackers have, for the first time, intentionally targeted each other. The attack in question occurred between Naikon, a cyberespionage group, and another group called Hellsing.

While the attack might look like simple revenge on the surface, Kaspersky Labs seems to think it’s the start of a new cybercrime trend in which hackers explicitly target each other. These are being called advanced persistent threat (APT) wars, where two major threats exchange blows over the possession of certain information.

The attack which launched these suspicions occurred on April 15th 2015, when Naikon launched a spear-phishing attack against Hellsing. As the smaller threat, Hellsing boldly responded to the attack with their own brand of malware. Once again, Naikon responded by masquerading as a foreign government official. This game of cat and mouse continued for some time, until Hellsing sent a password-protected message containing a special backdoor specifically made to target Naikon.

Commenting on the behavior of these two entities, Costin Daiu, Director of the Global Research and Analyst Team of Kaspersky Labs, reports:

The targeting of the Naikon group by Hellsing, in some sort of a vengeful vampire-hunting -- "Empire Strikes Back" style, is fascinating. In the past, we've seen APT groups accidentally hitting each other while stealing address books from victims and then mass-mailing everyone on each of these lists. However, considering the targeting and origin of the attack, it seems more likely that this is an example of a deliberate APT-on-APT attack.

The nature of the attack was likely in the interest of stealing information, which is the primary objective of most advanced persistent threats. The way these two threats fire off assaults is interesting, and the attacks they use are unsurprisingly sophisticated; almost as if they’re simply trying to outsmart the other. As always, the primary goal is to leverage each other to obtain higher profits.

This might suggest that hackers will eliminate themselves if we leave them alone long enough, but we highly doubt that. So long as there is information to steal, hackers will continue to find ways to take it. As a business owner, you should always remain aware of how much danger an advanced persistent threat holds for your business. In this case, you want to avoid getting caught in between two of these hackers at all costs. Always keep your machines in peak condition, and never forget to apply the latest patches and updates to your IT infrastructure.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 01 April 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Privacy Email Productivity Malware Business Software Business Computing User Tips Computer Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Google Innovation Smartphone Windows 10 IT Support Mobile Devices Network Security Ransomware Gmail Hardware Hacking WiFi Bandwidth Facebook Microsoft Office Office Backup Operating System Apps Business Continuity Disaster Recovery Communication The Internet of Things Social Media Alert Employer-Employee Relationship Networking History Two-factor Authentication Data storage Data Windows Small Business Experience Phishing App Mobile Computing Big Data communications Safety Mobile Device Management Unified Threat Management Money Network Smartphones Quick Tips Managed Service Provider Outlook Firewall Wireless Technology Content Filtering Android Cybercrime Website Apple Best Practice Network Congestion Application Save Money Customer Service Music Monitors Cryptocurrency Laptop Router IBM Displays Office 365 Google Docs Education Cleaning Holiday Analytics Black Market YouTube Saving Money Processors End of Support intranet Staffing Lithium-ion battery Office Tips LiFi BYOD Downtime Passwords Streaming Media Help Desk Writing Visible Light Communication Social Networking Disaster Micrsooft Public Speaking IP Address Business Growth Virtualization Data Management Advertising Recovery Robot Society Government Sports Retail Augmented Reality Google Wallet Keyboard Spam User Information Technology Running Cable Search Hard Drives Windows 8 Internet of Things IT Services Managed IT services Remote Computing Hosted Solution Shortcut Windows XP Artificial Intelligence Documents DDoS Heating/Cooling Tech Support Word Compliance Bluetooth Drones Social Printer Business Management Browser Automation Wireless Memory Virtual Desktop Competition Unified Communications Securty Presentation Document Management Entrepreneur Encryption Deep Learning VoIP BDR Domains Law Enforcement SaaS Hacker Proactive IT Cortana Vendor Management
QR-Code